[Git][security-tracker-team/security-tracker][master] 6 commits: Track removal of libperlspeak-perl

Salvatore Bonaccorso carnil at debian.org
Sat Jul 18 11:01:45 BST 2020



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
be8eac56 by Salvatore Bonaccorso at 2020-07-17T06:57:35+02:00
Track removal of libperlspeak-perl

- - - - -
d9685137 by Salvatore Bonaccorso at 2020-07-17T06:59:03+02:00
Track removal of enigmail

- - - - -
c91078b6 by Salvatore Bonaccorso at 2020-07-17T07:00:12+02:00
Track removal of libmicrodns

- - - - -
5353efe7 by Salvatore Bonaccorso at 2020-07-17T07:01:24+02:00
Track removal of pdns-recursor

- - - - -
258ee40e by Salvatore Bonaccorso at 2020-07-17T17:42:07+02:00
Merge fixes included in 9.13

- - - - -
527e1c28 by Salvatore Bonaccorso at 2020-07-18T10:01:37+00:00
Merge branch 'stretch-9.13' into 'master'

Track stretch 9.13 point release

See merge request security-tracker-team/security-tracker!59
- - - - -


2 changed files:

- data/CVE/list
- data/next-oldstable-point-update.txt


Changes:

=====================================
data/CVE/list
=====================================
@@ -661,7 +661,7 @@ CVE-2020-15541 (SolarWinds Serv-U FTP server before 15.2.1 allows remote command
 CVE-2020-15562 (An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x befo ...)
 	{DSA-4720-1}
 	- roundcube 1.4.7+dfsg.1-1 (bug #964355)
-	[stretch] - roundcube <no-dsa> (Minor issue; will be fixed via point release)
+	[stretch] - roundcube 1.2.3+dfsg.1-4+deb9u6
 	NOTE: 1.4.x https://github.com/roundcube/roundcubemail/commit/3e8832d029b035e3fcfb4c75839567a9580b4f82
 	NOTE: 1.3.x https://github.com/roundcube/roundcubemail/commit/19502419757a976dbd55ce5a746610c5bab7896b
 	NOTE: 1.2.x https://github.com/roundcube/roundcubemail/commit/f3d1566cf223eb04f47b6dfffcd88753f66c36ee
@@ -3926,13 +3926,12 @@ CVE-2020-14197
 CVE-2020-14196 (In PowerDNS Recursor versions up to and including 4.3.1, 4.2.2 and 4.1 ...)
 	- pdns-recursor 4.3.2-1 (low; bug #964103)
 	[buster] - pdns-recursor <postponed> (Minor issue, fix along in next DSA)
-	[stretch] - pdns-recursor <postponed> (Minor issue, fix along in next DSA)
 	NOTE: https://www.openwall.com/lists/oss-security/2020/07/01/1
 CVE-2020-14195 (FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the interact ...)
 	{DLA-2270-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2765
 	NOTE: https://github.com/FasterXML/jackson-databind/commit/f6d9c664f6d481703138319f6a0f1fdbddb3a259
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
@@ -4266,7 +4265,7 @@ CVE-2020-14062 (FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the in
 	{DLA-2270-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2704
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -4274,7 +4273,7 @@ CVE-2020-14061 (FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the in
 	{DLA-2270-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2698
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -4282,7 +4281,7 @@ CVE-2020-14060 (FasterXML jackson-databind 2.x before 2.9.10.5 mishandles the in
 	{DLA-2270-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2688
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -4529,6 +4528,7 @@ CVE-2020-13975
 	RESERVED
 CVE-2020-13974 (** DISPUTED ** An issue was discovered in the Linux kernel through 5.7 ...)
 	- linux 5.7.6-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://git.kernel.org/linus/b86dab054059b970111b5516ae548efaae5b3aae
 CVE-2020-13973 (OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls ...)
 	NOT-FOR-US: OWASP json-sanitizer
@@ -5160,6 +5160,7 @@ CVE-2019-20811 (An issue was discovered in the Linux kernel before 5.0.6. In rx_
 	NOTE: https://git.kernel.org/linus/a3e23f719f5c4a38ffb3d30c8d7632a4ed8ccd9e
 CVE-2019-20810 (go7007_snd_init in drivers/media/usb/go7007/snd-go7007.c in the Linux  ...)
 	- linux 5.6.7-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://git.kernel.org/linus/9453264ef58638ce8976121ac44c07a3ef375983
 CVE-2020-13759 (rust-vmm vm-memory before 0.1.1 and 0.2.x before 0.2.1 allows attacker ...)
 	NOT-FOR-US: rust-vmm
@@ -5426,7 +5427,7 @@ CVE-2020-13646 (In Cheetah free WiFi 5.1, the driver file (liebaonat.sys) allows
 CVE-2020-13645 (In GNOME glib-networking through 2.64.2, the implementation of GTlsCli ...)
 	- glib-networking 2.64.3-2 (bug #961756)
 	[buster] - glib-networking <no-dsa> (Minor issue; will be fixed via point release)
-	[stretch] - glib-networking <no-dsa> (Minor issue; will be fixed via point release)
+	[stretch] - glib-networking 2.50.0-1+deb9u1
 	NOTE: https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135
 	NOTE: Updating glib-networking to address CVE-2020-13645 will need a compatibility
 	NOTE: update as well for balsa (cf. https://bugs.debian.org/961792)
@@ -6652,19 +6653,19 @@ CVE-2020-13114 (An issue was discovered in libexif before 0.6.22. An unrestricte
 	{DLA-2222-1}
 	- libexif 0.6.21-9 (bug #961410)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u3
 	NOTE: https://github.com/libexif/libexif/commit/e6a38a1a23ba94d139b1fa2cd4519fdcfe3c9bab (0.6.22)
 CVE-2020-13113 (An issue was discovered in libexif before 0.6.22. Use of uninitialized ...)
 	{DLA-2222-1}
 	- libexif 0.6.21-9 (bug #961409)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u3
 	NOTE: https://github.com/libexif/libexif/commit/ec412aa4583ad71ecabb967d3c77162760169d1f (0.6.22)
 CVE-2020-13112 (An issue was discovered in libexif before 0.6.22. Several buffer over- ...)
 	{DLA-2222-1}
 	- libexif 0.6.21-9 (bug #961407)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u3
 	NOTE: https://github.com/libexif/libexif/commit/435e21f05001fb03f9f186fa7cbc69454afd00d1 (0.6.22)
 CVE-2020-13111 (NaviServer 4.99.4 to 4.99.19 allows denial of service due to the nsd/d ...)
 	NOT-FOR-US: NaviServer
@@ -7147,7 +7148,7 @@ CVE-2020-12873
 	RESERVED
 CVE-2020-12872 (yaws_config.erl in Yaws through 2.0.2 and/or 2.0.7 loads obsolete TLS  ...)
 	- erlang 1:21.2.6+dfsg-1 (low)
-	[stretch] - erlang <no-dsa> (Minor issue)
+	[stretch] - erlang 1:19.2.1+dfsg-2+deb9u3
 	[jessie] - erlang <no-dsa> (Minor issue)
 	NOTE: https://medium.com/@charlielabs101/cve-2020-12872-df315411aa70
 	NOTE: https://github.com/erlyaws/yaws/issues/402
@@ -7293,6 +7294,7 @@ CVE-2020-12826 (A signal access-control issue was discovered in the Linux kernel
 	{DLA-2241-1}
 	- linux 5.6.7-1
 	[buster] - linux 4.19.118-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://git.kernel.org/linus/d1e7fd6462ca9fc76650fbe6ca800e35b24267da
 CVE-2020-12825 (libcroco through 0.6.13 has excessive recursion in cr_parser_parse_any ...)
 	- libcroco <unfixed> (low; bug #960527)
@@ -7432,7 +7434,7 @@ CVE-2020-12767 (exif_entry_get_value in exif-entry.c in libexif 0.6.21 has a div
 	{DLA-2214-1}
 	- libexif 0.6.21-7 (bug #960199)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u2
 	NOTE: https://github.com/libexif/libexif/issues/31
 	NOTE: https://github.com/libexif/libexif/commit/e22f73064f804c94e90b642cd0db4697c827da72
 CVE-2019-20795 (iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ...)
@@ -7445,7 +7447,7 @@ CVE-2019-20795 (iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_n
 CVE-2020-XXXX [unspecified fexsrv security issue]
 	- fex 20160919-2
 	[buster] - fex 20160919-2~deb10u1
-	[stretch] - fex <no-dsa> (Non-free not supported)
+	[stretch] - fex 20160919-2~deb9u1
 CVE-2020-12771 (An issue was discovered in the Linux kernel through 5.6.11. btree_gc_c ...)
 	- linux 5.7.6-1
 	NOTE: https://lkml.org/lkml/2020/4/26/87
@@ -7458,6 +7460,7 @@ CVE-2020-12769 (An issue was discovered in the Linux kernel before 5.4.17. drive
 	{DLA-2241-1}
 	- linux 5.4.19-1
 	[buster] - linux 4.19.118-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://git.kernel.org/linus/19b61392c5a852b4e8a0bf35aecb969983c5932d (5.5-rc6)
 CVE-2020-12768 (** DISPUTED ** An issue was discovered in the Linux kernel before 5.6. ...)
 	{DSA-4699-1}
@@ -7584,7 +7587,7 @@ CVE-2020-12724
 CVE-2020-12723 (regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted ...)
 	- perl 5.30.3-1 (bug #962005)
 	[buster] - perl <no-dsa> (Minor issue)
-	[stretch] - perl <no-dsa> (Minor issue)
+	[stretch] - perl 5.24.1-3+deb9u7
 	NOTE: https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a (v5.30.3)
 CVE-2020-12722
 	RESERVED
@@ -8865,7 +8868,6 @@ CVE-2020-12244 (An issue has been found in PowerDNS Recursor 4.1.0 through 4.3.0
 	{DSA-4691-1}
 	- pdns-recursor 4.3.1-1
 	[jessie] - pdns-recursor <not-affected> (Vulnerable code added later)
-	[stretch] - pdns-recursor <end-of-life> (No longer supported, see DSA 4691)
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-02.html
 	NOTE: https://www.openwall.com/lists/oss-security/2020/05/19/3
 CVE-2020-12243 (In filter.c in slapd in OpenLDAP before 2.4.50, LDAP search filters wi ...)
@@ -9211,7 +9213,7 @@ CVE-2019-20788 (libvncclient/cursor.c in LibVNCServer through 0.9.12 has a Handl
 	{DLA-2146-1}
 	- libvncserver 0.9.12+dfsg-9 (bug #954163)
 	[buster] - libvncserver 0.9.11+dfsg-1.3+deb10u3
-	[stretch] - libvncserver <no-dsa> (Minor issue)
+	[stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u4
 	NOTE: https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
 CVE-2020-12137 (GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed app ...)
 	{DSA-4664-1 DLA-2200-1}
@@ -9303,7 +9305,7 @@ CVE-2020-12049 (An issue was discovered in dbus >= 1.3.0 before 1.12.18. The
 	{DLA-2235-1}
 	- dbus 1.12.18-1
 	[buster] - dbus <no-dsa> (Minor issue)
-	[stretch] - dbus <no-dsa> (Minor issue)
+	[stretch] - dbus 1.10.32-0+deb9u1
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/04/3
 	NOTE: https://gitlab.freedesktop.org/dbus/dbus/-/issues/294
 	NOTE: Fixed by: https://gitlab.freedesktop.org/dbus/dbus/-/commit/272d484283883fa9ff95b69d924fff6cd34842f5
@@ -10975,7 +10977,7 @@ CVE-2020-11736 (fr-archive-libarchive.c in GNOME file-roller through 3.36.1 allo
 	{DLA-2180-1}
 	- file-roller 3.36.2-1 (bug #956638)
 	[buster] - file-roller <no-dsa> (Minor issue, will be fixed via spu)
-	[stretch] - file-roller <no-dsa> (Minor issue, will be fixed via spu)
+	[stretch] - file-roller 3.22.3-1+deb9u2
 	NOTE: https://gitlab.gnome.org/GNOME/file-roller/-/commit/21dfcdbfe258984db89fb65243a1a888924e45a0
 CVE-2020-11734 (cgi-bin/go in CyberSolutions CyberMail 5 or later allows XSS via the A ...)
 	NOT-FOR-US: CyberSolutions CyberMail
@@ -11294,7 +11296,7 @@ CVE-2020-11620 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2682
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -11302,7 +11304,7 @@ CVE-2020-11619 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2680
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -12679,7 +12681,7 @@ CVE-2020-11113 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2670
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -12687,7 +12689,7 @@ CVE-2020-11112 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2666
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -12695,7 +12697,7 @@ CVE-2020-11111 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2664
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -13171,7 +13173,6 @@ CVE-2020-10995 (PowerDNS Recursor from 4.1.0 up to and including 4.3.0 does not
 	{DSA-4691-1}
 	- pdns-recursor 4.3.1-1
 	[jessie] - pdns-recursor <not-affected> (Vulnerable code added later)
-	[stretch] - pdns-recursor <end-of-life> (No longer supported, see DSA 4691)
 	NOTE: https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html
 	NOTE: https://www.openwall.com/lists/oss-security/2020/05/19/3
 CVE-2020-10994 (In libImaging/Jpeg2KDecode.c in Pillow before 7.1.0, there are multipl ...)
@@ -13247,7 +13248,7 @@ CVE-2020-10969 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2642
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -13255,7 +13256,7 @@ CVE-2020-10968 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2179-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2662
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -13529,7 +13530,7 @@ CVE-2020-10879 (rConfig before 3.9.5 allows command injection by sending a craft
 CVE-2020-10878 (Perl before 5.30.3 has an integer overflow related to mishandling of a ...)
 	- perl 5.30.3-1 (bug #962005)
 	[buster] - perl <no-dsa> (Minor issue)
-	[stretch] - perl <no-dsa> (Minor issue)
+	[stretch] - perl 5.24.1-3+deb9u7
 	NOTE: https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8 (v5.30.3)
 	NOTE: https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c (v5.30.3)
 CVE-2020-10877
@@ -13899,7 +13900,7 @@ CVE-2016-11022 (NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5
 	NOT-FOR-US: Netgear
 CVE-2020-10804 (In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection v ...)
 	- phpmyadmin 4:4.9.5+dfsg1-1 (bug #954667)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	[jessie] - phpmyadmin <not-affected> (Vulnerable code not present)
 	NOTE: Introduced-by: https://github.com/phpmyadmin/phpmyadmin/commit/56b43527196b0349ec2bea8ca711667e5aa75c65
 	NOTE: Introduced-by: https://github.com/phpmyadmin/phpmyadmin/commit/d55abcd5ffa1ea8785f1217f5b7d78a8a54b8542
@@ -13909,14 +13910,14 @@ CVE-2020-10804 (In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injec
 CVE-2020-10803 (In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection v ...)
 	{DLA-2154-1}
 	- phpmyadmin 4:4.9.5+dfsg1-1 (bug #954666)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2020-4/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/46a7aa7cd4ff2be0eeb23721fbf71567bebe69a5
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/6b9b2601d8af916659cde8aefd3a6eaadd10284a
 CVE-2020-10802 (In phpMyAdmin 4.x before 4.9.5 and 5.x before 5.0.2, a SQL injection v ...)
 	{DLA-2154-1}
 	- phpmyadmin 4:4.9.5+dfsg1-1 (bug #954665)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2020-3/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/a8acd7a42cf743186528b0453f90aaa32bfefabe
 CVE-2020-10801
@@ -14005,16 +14006,19 @@ CVE-2020-10769 (A buffer over-read flaw was found in RH kernel versions before 5
 CVE-2020-10768 [Indirect branch speculation can be enabled after it was force-disabled by the PR_SPEC_FORCE_DISABLE prctl command]
 	RESERVED
 	- linux 5.7.6-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/10/1
 	NOTE: https://git.kernel.org/linus/4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf
 CVE-2020-10767 [Indirect Branch Prediction Barrier is force-disabled when STIBP is unavailable or enhanced IBRS is available]
 	RESERVED
 	- linux 5.7.6-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/10/1
 	NOTE: https://git.kernel.org/linus/21998a351512eba4ed5969006f0c55882d995ada
 CVE-2020-10766 [Rogue cross-process SSBD shutdown]
 	RESERVED
 	- linux 5.7.6-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/10/1
 	NOTE: https://git.kernel.org/linus/dbbe2ad02e9df26e372f38cc3e70dab9222c832e
 CVE-2020-10765
@@ -14332,6 +14336,7 @@ CVE-2020-10690 (There is a use-after-free in kernel versions before 5.5 due to a
 	{DLA-2241-1}
 	- linux 5.4.8-1
 	[buster] - linux 4.19.98-1
+	[stretch] - linux 4.9.228-1
 	NOTE: Fixed by: https://git.kernel.org/linus/a33121e5487b424339636b25c35d3a180eaa5f5e
 CVE-2020-10689 (A flaw was found in the Eclipse Che up to version 7.8.x, where it did  ...)
 	NOT-FOR-US: Eclipse Che
@@ -14391,7 +14396,7 @@ CVE-2020-10673 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2153-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2660
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -14399,7 +14404,7 @@ CVE-2020-10672 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the in
 	{DLA-2153-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2659
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -14417,7 +14422,6 @@ CVE-2020-10666
 	RESERVED
 CVE-2020-10674 (PerlSpeak through 2.01 allows attackers to execute arbitrary OS comman ...)
 	- libperlspeak-perl <removed> (bug #954238)
-	[stretch] - libperlspeak-perl <ignored> (Will be removed in next point release)
 	[jessie] - libperlspeak-perl <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://rt.cpan.org/Public/Bug/Display.html?id=132173
 CVE-2020-10665 (Docker Desktop allows local privilege escalation to NT AUTHORITY\SYSTE ...)
@@ -14428,11 +14432,11 @@ CVE-2020-10663 (The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through
 	{DSA-4721-1 DLA-2192-1 DLA-2190-1}
 	- ruby-json 2.3.0+dfsg-1
 	[buster] - ruby-json <no-dsa> (Minor issue)
-	[stretch] - ruby-json <no-dsa> (Minor issue)
+	[stretch] - ruby-json 2.0.1+dfsg-3+deb9u1
 	- ruby2.7 <not-affected> (Fixed before initial upload to Debian)
 	- ruby2.5 <removed>
 	- ruby2.3 <removed>
-	[stretch] - ruby2.3 <no-dsa> (Minor issue)
+	[stretch] - ruby2.3 2.3.3-1+deb9u8
 	- ruby2.1 <removed>
 	NOTE: https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/
 	NOTE: https://hackerone.com/reports/706934
@@ -14753,7 +14757,7 @@ CVE-2009-5159 (Invision Power Board (aka IPB or IP.Board) 2.x through 3.0.4, whe
 CVE-2020-10543 (Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer over ...)
 	- perl 5.30.3-1 (bug #962005)
 	[buster] - perl <no-dsa> (Minor issue)
-	[stretch] - perl <no-dsa> (Minor issue)
+	[stretch] - perl 5.24.1-3+deb9u7
 	NOTE: https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed (v5.30.3)
 CVE-2020-10542
 	RESERVED
@@ -16977,7 +16981,7 @@ CVE-2020-9548 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the int
 	{DLA-2135-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2634
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -16985,7 +16989,7 @@ CVE-2020-9547 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the int
 	{DLA-2135-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2634
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -16993,7 +16997,7 @@ CVE-2020-9546 (FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the int
 	{DLA-2135-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2631
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
 	NOTE: but still an issue when Default Typing is enabled.
@@ -18635,7 +18639,7 @@ CVE-2020-8866 (This vulnerability allows remote attackers to create arbitrary fi
 	{DLA-2162-1}
 	- php-horde-form 2.0.20-1 (bug #955020)
 	[buster] - php-horde-form 2.0.18-3.1+deb10u1
-	[stretch] - php-horde-form <no-dsa> (Minor issue)
+	[stretch] - php-horde-form 2.0.15-1+deb9u2
 	NOTE: https://lists.horde.org/archives/announce/2020/001288.html
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-20-275/
 	NOTE: https://github.com/horde/Form/commit/813f8e7e9479fad4546b89c569325ee9eef60b0f
@@ -18643,7 +18647,7 @@ CVE-2020-8865 (This vulnerability allows remote attackers to execute local PHP f
 	{DLA-2175-1}
 	- php-horde-trean 1.1.10-1 (bug #955019)
 	[buster] - php-horde-trean 1.1.9-3+deb10u1
-	[stretch] - php-horde-trean <no-dsa> (Minor issue)
+	[stretch] - php-horde-trean 1.1.7-1+deb9u1
 	NOTE: https://lists.horde.org/archives/announce/2020/001286.html
 	NOTE: https://www.zerodayinitiative.com/advisories/ZDI-20-276/
 	NOTE: https://github.com/horde/trean/commit/db0714a0c04d87bda9e2852f1b0d259fc281ca75
@@ -18700,7 +18704,7 @@ CVE-2020-8840 (FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain x
 	{DLA-2111-1}
 	- jackson-databind 2.11.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2620
 	NOTE: https://github.com/FasterXML/jackson-databind/commit/914e7c9f2cb8ce66724bf26a72adc7e958992497
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
@@ -19485,7 +19489,7 @@ CVE-2020-8518 (Horde Groupware Webmail Edition 5.2.22 allows injection of arbitr
 	{DLA-2174-1}
 	- php-horde-data <unfixed> (bug #951537)
 	[buster] - php-horde-data 2.1.4-5+deb10u1
-	[stretch] - php-horde-data <no-dsa> (Minor issue)
+	[stretch] - php-horde-data 2.1.4-3+deb9u1
 	NOTE: https://lists.horde.org/archives/announce/2020/001285.html
 	NOTE: https://github.com/horde/Data/commit/78ad0c2390176cdde7260a271bc6ddd86f4c9c0e
 CVE-2020-8517 (An issue was discovered in Squid before 4.10. Due to incorrect input v ...)
@@ -20399,7 +20403,7 @@ CVE-2020-8130 (There is an OS command injection vulnerability in Ruby Rake <
 	{DLA-2120-1}
 	- rake 12.3.3-1
 	[buster] - rake 12.3.1-3+deb10u1
-	[stretch] - rake <no-dsa> (Minor issue)
+	[stretch] - rake 10.5.0-2+deb9u1
 	NOTE: https://hackerone.com/reports/651518
 	NOTE: Fixed by: https://github.com/ruby/rake/commit/5b8f8fc41a5d7d7d6a5d767e48464c60884d3aee (v12.3.3)
 CVE-2020-8129 (An unintended require vulnerability in script-manager npm package vers ...)
@@ -20630,14 +20634,14 @@ CVE-2020-8035 (The image view functionality in Horde Groupware Webmail Edition b
 	{DLA-2230-1}
 	- php-horde 5.2.23+debian0-1 (bug #963809)
 	[buster] - php-horde <no-dsa> (Minor issue; can be fixed via point release)
-	[stretch] - php-horde <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - php-horde 5.2.13+debian0-1+deb9u2
 	NOTE: https://github.com/horde/base/commit/64127fe3c2b9843c9760218e59dae9731cc56bdf
 	NOTE: https://lists.horde.org/archives/announce/2020/001290.html
 CVE-2020-8034 (Gollem before 3.0.13, as used in Horde Groupware Webmail Edition 5.2.2 ...)
 	{DLA-2229-1}
 	- php-horde-gollem 3.0.12-6 (bug #961649)
 	[buster] - php-horde-gollem <no-dsa> (Minor issue)
-	[stretch] - php-horde-gollem <no-dsa> (Minor issue)
+	[stretch] - php-horde-gollem 3.0.10-1+deb9u1
 	NOTE: https://lists.horde.org/archives/announce/2020/001289.html
 	NOTE: https://github.com/horde/gollem/commit/a73bef1aef27d4cbfc7b939c2a81dea69aabb083
 CVE-2020-8033 (Ruckus R500 3.4.2.0.384 devices allow XSS via the index.asp Device Nam ...)
@@ -23046,7 +23050,7 @@ CVE-2020-7040 (storeBackup.pl in storeBackup through 3.5 relies on the /tmp/stor
 	{DLA-2095-1}
 	- storebackup 3.2.1-2 (bug #949393)
 	[buster] - storebackup <no-dsa> (Minor issue)
-	[stretch] - storebackup <no-dsa> (Minor issue)
+	[stretch] - storebackup 3.2.1-2~deb9u1
 	NOTE: https://bugzilla.suse.com/show_bug.cgi?id=1156767
 	NOTE: https://www.openwall.com/lists/oss-security/2020/01/20/3
 	NOTE: SuSE provided patch: https://www.openwall.com/lists/oss-security/2020/01/20/3/1
@@ -23800,7 +23804,7 @@ CVE-2019-20374 (A mutation cross-site scripting (XSS) issue in Typora through 0.
 CVE-2019-20372 (NGINX before 1.17.7, with certain error_page configurations, allows HT ...)
 	- nginx 1.16.1-3 (low; bug #948579)
 	[buster] - nginx <no-dsa> (Minor issue)
-	[stretch] - nginx <no-dsa> (Minor issue)
+	[stretch] - nginx 1.10.3-1+deb9u4
 	[jessie] - nginx <no-dsa> (Minor issue)
 	NOTE: https://bertjwregeer.keybase.pub/2019-12-10%20-%20error_page%20request%20smuggling.pdf
 	NOTE: https://github.com/nginx/nginx/commit/c1be55f97211d38b69ac0c2027e6812ab8b1b94e
@@ -25552,7 +25556,6 @@ CVE-2020-6081 (An exploitable code execution vulnerability exists in the PLC_Tas
 CVE-2020-6080 (An exploitable denial-of-service vulnerability exists in the resource  ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
@@ -25560,7 +25563,6 @@ CVE-2020-6080 (An exploitable denial-of-service vulnerability exists in the reso
 CVE-2020-6079 (An exploitable denial-of-service vulnerability exists in the resource  ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1002
@@ -25568,7 +25570,6 @@ CVE-2020-6079 (An exploitable denial-of-service vulnerability exists in the reso
 CVE-2020-6078 (An exploitable denial-of-service vulnerability exists in the message-p ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1001
@@ -25576,7 +25577,6 @@ CVE-2020-6078 (An exploitable denial-of-service vulnerability exists in the mess
 CVE-2020-6077 (An exploitable denial-of-service vulnerability exists in the message-p ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-1000
@@ -25590,7 +25590,6 @@ CVE-2020-6074 (An exploitable code execution vulnerability exists in the PDF par
 CVE-2020-6073 (An exploitable denial-of-service vulnerability exists in the TXT recor ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-0996
@@ -25598,7 +25597,6 @@ CVE-2020-6073 (An exploitable denial-of-service vulnerability exists in the TXT
 CVE-2020-6072 (An exploitable code execution vulnerability exists in the label-parsin ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-0995
@@ -25606,7 +25604,6 @@ CVE-2020-6072 (An exploitable code execution vulnerability exists in the label-p
 CVE-2020-6071 (An exploitable denial-of-service vulnerability exists in the resource  ...)
 	{DSA-4671-1}
 	- libmicrodns <removed>
-	[stretch] - libmicrodns <ignored> (Will be removed in next point release)
 	- vlc 3.0.8-4
 	[jessie] - vlc <end-of-life> (Not supported in jessie LTS)
 	NOTE: https://talosintelligence.com/vulnerability_reports/TALOS-2020-0994
@@ -25828,7 +25825,7 @@ CVE-2020-5968 (NVIDIA Virtual GPU Manager contains a vulnerability in the vGPU p
 CVE-2020-5967 (NVIDIA Linux GPU Display Driver, all versions, contains a vulnerabilit ...)
 	- nvidia-graphics-drivers 440.100-1 (bug #963766)
 	[buster] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
-	[stretch] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
+	[stretch] - nvidia-graphics-drivers 390.138-1
 	[jessie] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
 	- nvidia-graphics-drivers-legacy-390xx 390.138-1 (bug #963908)
 	[buster] - nvidia-graphics-drivers-legacy-390xx <no-dsa> (Non-free not supported)
@@ -25850,7 +25847,7 @@ CVE-2020-5964 (NVIDIA Windows GPU Display Driver, all versions, contains a vulne
 CVE-2020-5963 (NVIDIA Windows GPU Display Driver, all versions, contains a vulnerabil ...)
 	- nvidia-graphics-drivers 440.100-1 (bug #963766)
 	[buster] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
-	[stretch] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
+	[stretch] - nvidia-graphics-drivers 390.138-1
 	[jessie] - nvidia-graphics-drivers <no-dsa> (Non-free not supported)
 	- nvidia-graphics-drivers-legacy-390xx 390.138-1 (bug #963908)
 	[buster] - nvidia-graphics-drivers-legacy-390xx <no-dsa> (Non-free not supported)
@@ -26836,7 +26833,7 @@ CVE-2020-5505 (Freelancy v1.0.0 allows remote command execution via the "file":"
 CVE-2020-5504 (In phpMyAdmin 4 before 4.9.4 and 5 before 5.0.1, SQL injection exists  ...)
 	{DLA-2060-1}
 	- phpmyadmin 4:4.9.4+dfsg1-1 (bug #948718)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/c86acbf3ed49f69cf38b31879886dd5eb86b6983
 	NOTE: https://gist.github.com/ibennetch/4c1b701f4b766e4dd5556e8e26200b6b
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2020-1/
@@ -27381,7 +27378,7 @@ CVE-2020-5267 (In ActionView before versions 6.0.2.2 and 5.2.4.2, there is a pos
 	{DLA-2149-1}
 	- rails 2:5.2.4.1+dfsg-2 (bug #954304)
 	[buster] - rails 2:5.2.2.1+dfsg-1+deb10u1
-	[stretch] - rails <no-dsa> (Minor issue)
+	[stretch] - rails 2:4.2.7.1-1+deb9u2
 	NOTE: https://www.openwall.com/lists/oss-security/2020/03/19/1
 	NOTE: https://github.com/rails/rails/commit/033a738817abd6e446e1b320cb7d1a5c15224e9a (master)
 CVE-2020-5266 (In the ps_link module for PrestaShop before version 3.1.0, there is a  ...)
@@ -27626,7 +27623,7 @@ CVE-2019-20330 (FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net
 	{DLA-2111-1}
 	- jackson-databind 2.10.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2526
 	NOTE: https://github.com/FasterXML/jackson-databind/commit/fc4214a883dc087070f25da738ef0d49c2f3387e
 CVE-2019-20329 (OpenLambda 2019-09-10 allows DNS rebinding attacks against the OL serv ...)
@@ -31445,7 +31442,7 @@ CVE-2020-3898 [heap based buffer overflow in libcups's ppdFindOption() in ppd-ma
 	{DLA-2237-1}
 	- cups 2.3.1-12
 	[buster] - cups 2.2.10-6+deb10u3
-	[stretch] - cups <no-dsa> (Minor issue)
+	[stretch] - cups 2.2.1-8+deb9u6
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1823964
 	NOTE: https://src.fedoraproject.org/rpms/cups/blob/c1920d09b842bd2d0611559d00d595abd8aa2424/f/cups-ppdopen-heap-overflow.patch
 	NOTE: https://github.com/apple/cups/commit/82e3ee0e3230287b76a76fb8f16b92ca6e50b444 (cups/ppd.c, ppdc/ppdc-source.cxx)
@@ -32974,7 +32971,7 @@ CVE-2020-3341 (A vulnerability in the PDF archive parsing module in Clam AntiVir
 	{DLA-2215-1}
 	- clamav 0.102.3+dfsg-1
 	[buster] - clamav <no-dsa> (ClamAV is updated via -updates)
-	[stretch] - clamav <no-dsa> (ClamAV is updated via -updates)
+	[stretch] - clamav 0.102.3+dfsg-0~deb9u1
 	NOTE: https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
 CVE-2020-3340 (Multiple vulnerabilities in the web-based management interface of Cisc ...)
 	NOT-FOR-US: Cisco
@@ -33006,7 +33003,7 @@ CVE-2020-3327 (A vulnerability in the ARJ archive parsing module in Clam AntiVir
 	{DLA-2215-1}
 	- clamav 0.102.3+dfsg-1
 	[buster] - clamav <no-dsa> (ClamAV is updated via -updates)
-	[stretch] - clamav <no-dsa> (ClamAV is updated via -updates)
+	[stretch] - clamav 0.102.3+dfsg-0~deb9u1
 	NOTE: https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
 CVE-2020-3326
 	RESERVED
@@ -33417,7 +33414,7 @@ CVE-2020-3124
 CVE-2020-3123 (A vulnerability in the Data-Loss-Prevention (DLP) module in Clam AntiV ...)
 	- clamav 0.102.2+dfsg-1 (bug #950944)
 	[buster] - clamav 0.102.2+dfsg-0+deb10u1
-	[stretch] - clamav <no-dsa> (ClamAV is updated via -updates)
+	[stretch] - clamav 0.102.2+dfsg-0~deb9u1
 	[jessie] - clamav <not-affected> (Vulnerable code introduced in 0.102.x)
 	NOTE: https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html
 CVE-2020-3122
@@ -34232,7 +34229,7 @@ CVE-2020-2814 (Vulnerability in the MySQL Server product of Oracle MySQL (compon
 	- mariadb-10.3 1:10.3.23-1 (bug #961849)
 	[buster] - mariadb-10.3 <no-dsa> (Minor issue; will be fixed via point release)
 	- mariadb-10.1 <removed>
-	[stretch] - mariadb-10.1 <no-dsa> (Will be fixed via point release)
+	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
 	- mysql-5.7 <unfixed> (bug #956832)
 	NOTE: https://www.oracle.com/security-alerts/cpuapr2020.html#AppendixMSQL
 	NOTE: Fixed in MariaDB 10.3.23, 10.1.45
@@ -34242,7 +34239,7 @@ CVE-2020-2812 (Vulnerability in the MySQL Server product of Oracle MySQL (compon
 	- mariadb-10.3 1:10.3.23-1 (bug #961849)
 	[buster] - mariadb-10.3 <no-dsa> (Minor issue; will be fixed via point release)
 	- mariadb-10.1 <removed>
-	[stretch] - mariadb-10.1 <no-dsa> (Will be fixed via point release)
+	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
 	- mysql-5.7 <unfixed> (bug #956832)
 	NOTE: https://www.oracle.com/security-alerts/cpuapr2020.html#AppendixMSQL
 	NOTE: Fixed in MariaDB 10.3.23, 10.1.45
@@ -34424,7 +34421,7 @@ CVE-2020-2752 (Vulnerability in the MySQL Client product of Oracle MySQL (compon
 	- mariadb-10.3 1:10.3.23-1 (bug #961849)
 	[buster] - mariadb-10.3 <no-dsa> (Minor issue; will be fixed via point release)
 	- mariadb-10.1 <removed>
-	[stretch] - mariadb-10.1 <no-dsa> (Will be fixed via point release)
+	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
 	- mysql-5.7 <unfixed> (bug #956832)
 	NOTE: https://www.oracle.com/security-alerts/cpuapr2020.html#AppendixMSQL
 	NOTE: Fixed in MariaDB 10.3.23, 10.1.45
@@ -37640,6 +37637,7 @@ CVE-2020-1749 [net: ipv6_stub: use ip6_dst_lookup_flow instead of ip6_dst_lookup
 	{DLA-2241-1}
 	- linux 5.4.6-1
 	[buster] - linux 4.19.118-1
+	[stretch] - linux 4.9.228-1
 	NOTE: https://git.kernel.org/linus/6c8991f41546c3c472503dff1ea9daaddf9331c2
 CVE-2020-1748
 	RESERVED
@@ -43963,7 +43961,7 @@ CVE-2020-0198 (In exif_data_load_data_content of exif-data.c, there is a possibl
 	{DLA-2249-1}
 	- libexif 0.6.22-2 (bug #962345)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u4
 	NOTE: https://android.googlesource.com/platform/external/libexif/+/1e187b62682ffab5003c702657d6d725b4278f16%5E%21/#F0
 	NOTE: https://github.com/libexif/libexif/commit/ce03ad7ef4e8aeefce79192bf5b6f69fae396f0c
 CVE-2020-0197 (In InitDataParser::parsePssh of InitDataParser.cpp, there is a possibl ...)
@@ -44000,7 +43998,7 @@ CVE-2020-0182 (In exif_entry_get_value of exif-entry.c, there is a possible out
 	{DLA-2249-1}
 	- libexif 0.6.22-1 (low)
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u4
 	NOTE: https://github.com/libexif/libexif/commit/f9bb9f263fb00f0603ecbefa8957cad24168cbff (0.6.22)
 	NOTE: CVE originally originally reported by Android where a different patch was shipped
 CVE-2020-0181 (In exif_data_load_data_thumbnail of exif-data.c, there is a possible d ...)
@@ -44191,7 +44189,7 @@ CVE-2020-0093 (In exif_data_save_data_entry of exif-data.c, there is a possible
 	{DLA-2214-1}
 	- libexif 0.6.21-8
 	[buster] - libexif <no-dsa> (Minor issue)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u2
 	NOTE: https://github.com/libexif/libexif/issues/42
 	NOTE: https://github.com/libexif/libexif/commit/5ae5973bed1947f4d447dc80b76d5cefadd90133
 CVE-2020-0092 (In setHideSensitive of NotificationStackScrollLayout.java, there is a  ...)
@@ -44378,7 +44376,7 @@ CVE-2020-0009 (In calc_vm_may_flags of ashmem.c, there is a possible arbitrary w
 	{DLA-2241-1}
 	- linux 5.5.13-1
 	[buster] - linux 4.19.118-1
-	[stretch] - linux <ignored> (Driver is not enabled or supported)
+	[stretch] - linux 4.9.228-1
 	NOTE: https://bugs.chromium.org/p/project-zero/issues/detail?id=1949
 CVE-2020-0008 (In LowEnergyClient::MtuChangedCallback of low_energy_client.cc, there  ...)
 	NOT-FOR-US: Android
@@ -45775,7 +45773,7 @@ CVE-2019-17566 [SSRF vulnerability]
 	RESERVED
 	- batik 1.12-1.1 (bug #964510)
 	[buster] - batik <no-dsa> (Minor issue, will be fixed via point update)
-	[stretch] - batik <no-dsa> (Minor issue, will be fixed via point update)
+	[stretch] - batik 1.8-4+deb9u2
 	NOTE: https://www.openwall.com/lists/oss-security/2020/06/15/2
 	NOTE: patch: http://svn.apache.org/viewvc?view=revision&revision=1871084
 	NOTE: corresponding bug: https://issues.apache.org/jira/browse/BATIK-1276
@@ -46015,7 +46013,7 @@ CVE-2019-17531 (A Polymorphic Typing issue was discovered in FasterXML jackson-d
 	{DLA-2030-1}
 	- jackson-databind 2.10.1-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2498
 	NOTE: https://github.com/FasterXML/jackson-databind/commit/b5a304a98590b6bb766134f9261e6566dcbbb6d0
 	NOTE: Starting from 2.10 series mitigated as Safe Default Typing is enabled by default
@@ -46699,7 +46697,7 @@ CVE-2019-17267 (A Polymorphic Typing issue was discovered in FasterXML jackson-d
 	{DLA-2030-1}
 	- jackson-databind 2.10.0-1
 	[buster] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
-	[stretch] - jackson-databind <no-dsa> (Minor issue; can be fixed via a point release)
+	[stretch] - jackson-databind 2.8.6-1+deb9u7
 	NOTE: https://github.com/FasterXML/jackson-databind/issues/2460
 	NOTE: https://github.com/FasterXML/jackson-databind/commit/191a4cdf87b56d2ddddb77edd895ee756b7f75eb
 CVE-2019-17266 (libsoup from versions 2.65.1 until 2.68.1 have a heap-based buffer ove ...)
@@ -49615,7 +49613,7 @@ CVE-2019-16378 (OpenDMARC through 1.3.2 and 1.4.x through 1.4.0-Beta1 is prone t
 CVE-2019-16275 (hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect  ...)
 	{DSA-4538-1 DLA-1922-1}
 	- wpa 2:2.9-2 (bug #940080)
-	[stretch] - wpa <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - wpa 2:2.4-1+deb9u6
 	NOTE: https://www.openwall.com/lists/oss-security/2019/09/11/7
 	NOTE: https://w1.fi/security/2019-7/
 CVE-2019-16238 (Afterlogic Aurora through 8.3.9-build-a3 has XSS that can be leveraged ...)
@@ -51225,7 +51223,7 @@ CVE-2019-15690
 	{DLA-2146-1}
 	- libvncserver 0.9.12+dfsg-9 (bug #954163)
 	[buster] - libvncserver 0.9.11+dfsg-1.3+deb10u3
-	[stretch] - libvncserver <no-dsa> (Minor issue)
+	[stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u4
 	NOTE: https://www.openwall.com/lists/oss-security/2019/12/20/2
 	NOTE: https://github.com/LibVNC/libvncserver/issues/381
 	NOTE: https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
@@ -51781,7 +51779,7 @@ CVE-2019-15523
 CVE-2019-15522 (An issue was discovered in LINBIT csync2 through 2.0. csync_daemon_ses ...)
 	- csync2 2.0-25-gc0faaf9-1 (bug #955445)
 	[buster] - csync2 2.0-22-gce67c55-1+deb10u1
-	[stretch] - csync2 <no-dsa> (Minor issue)
+	[stretch] - csync2 2.0-8-g175a01c-4+deb9u1
 	[jessie] - csync2 <no-dsa> (Minor issue)
 	NOTE: https://github.com/LINBIT/csync2/pull/13/commits/0ecfc333da51575f188dd7cf6ac4974d13a800b1
 CVE-2019-15521 (Spoon Library through 2014-02-06, as used in Fork CMS before 1.4.1 and ...)
@@ -53259,7 +53257,7 @@ CVE-2016-10894 (xtrlock through 2.10 does not block multitouch events. Consequen
 	{DLA-1959-1}
 	- xtrlock 2.12 (bug #830726)
 	[buster] - xtrlock 2.8+deb10u1
-	[stretch] - xtrlock <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - xtrlock 2.8+deb9u1
 CVE-2016-10893 (The crayon-syntax-highlighter plugin before 2.8.4 for WordPress has mu ...)
 	NOT-FOR-US: Wordpress plugin
 CVE-2016-10892 (The chained-quiz plugin before 1.0 for WordPress has multiple XSS issu ...)
@@ -54726,7 +54724,6 @@ CVE-2019-14665 (Brandy 1.20.1 has a heap-based buffer overflow in define_array i
 CVE-2019-14664 (In Enigmail below 2.1, an attacker in possession of PGP encrypted emai ...)
 	- enigmail <unfixed>
 	[buster] - enigmail <ignored> (Minor issue and too intrusive to backport)
-	[stretch] - enigmail <ignored> (Minor issue and too intrusive to backport)
 	[jessie] - enigmail <end-of-life> (see https://lists.debian.org/debian-lts-announce/2019/02/msg00002.html)
 	NOTE: https://sourceforge.net/p/enigmail/bugs/984/
 CVE-2019-14663 (Brandy 1.20.1 has a stack-based buffer overflow in fileio_openin in fi ...)
@@ -55314,6 +55311,7 @@ CVE-2019-14466 (The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulne
 	{DLA-1905-1}
 	- gosa 2.7.4+reloaded3-10
 	[buster] - gosa 2.7.4+reloaded3-8+deb10u2
+	[stretch] - gosa 2.7.4+reloaded2-13+deb9u3
 	NOTE: https://github.com/gosa-project/gosa-core/commit/e1504e9765db2adde8b4685b5c93fbba57df868b (fix)
 	NOTE: https://github.com/gosa-project/gosa-core/commit/90b674960335d888c76ca5e99027df8e7fa66f3a (fixing the prev commit)
 	NOTE: https://github.com/gosa-project/gosa-core/pull/30#issuecomment-521975100
@@ -61988,7 +61986,7 @@ CVE-2019-12617 (In SilverStripe through 4.3.3, there is access escalation for CM
 CVE-2019-12616 (An issue was discovered in phpMyAdmin before 4.9.0. A vulnerability wa ...)
 	{DLA-1821-1}
 	- phpmyadmin 4:4.9.1+dfsg1-2 (bug #930017)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2019-4/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/015c404038c44279d95b6430ee5a0dddc97691ec
 CVE-2019-12613
@@ -62975,7 +62973,6 @@ CVE-2019-12270 (OpenText Brava! Enterprise and Brava! Server 7.5 through 16.4 co
 CVE-2019-12269 (Enigmail before 2.0.11 allows PGP signature spoofing: for an inline PG ...)
 	- enigmail 2:2.0.11+ds1-1 (bug #929363)
 	[buster] - enigmail 2:2.0.12+ds1-1~deb10u1
-	[stretch] - enigmail <no-dsa> (Issue can be fixed via point release)
 	[jessie] - enigmail <end-of-life> (see https://lists.debian.org/debian-lts-announce/2019/02/msg00002.html)
 	NOTE: https://sourceforge.net/p/enigmail/bugs/983/
 CVE-2019-12268
@@ -64228,7 +64225,7 @@ CVE-2019-11769 (An issue was discovered in TeamViewer 14.2.2558. Updating the pr
 	NOT-FOR-US: TeamViewer
 CVE-2019-11768 (An issue was discovered in phpMyAdmin before 4.9.0.1. A vulnerability  ...)
 	- phpmyadmin 4:4.9.1+dfsg1-2 (bug #930048)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	[jessie] - phpmyadmin <not-affected> (vulnerable code is not present)
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2019-3/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/c1ecafc38319e8f768c9259d4d580e42acd5ee86
@@ -65379,7 +65376,7 @@ CVE-2019-11459 (The tiff_document_render() and tiff_document_get_thumbnail() fun
 	{DSA-4624-1 DLA-1882-1 DLA-1881-1}
 	- atril 1.22.3-1 (unimportant; bug #927821)
 	[buster] - atril 1.20.3-1+deb10u1
-	[stretch] - atril <no-dsa> (Will be fixed via spu)
+	[stretch] - atril 1.16.1-2+deb9u2
 	- evince 3.32.0-3 (unimportant; bug #927820)
 	[buster] - evince 3.30.2-3+deb10u1
 	NOTE: https://gitlab.gnome.org/GNOME/evince/issues/1129
@@ -66093,7 +66090,7 @@ CVE-2019-11187 (Incorrect Access Control in the LDAP class of GONICUS GOsa throu
 	[stretch] - fusiondirectory 1.0.19-1+deb9u1
 	- gosa 2.7.4+reloaded3-9
 	[buster] - gosa 2.7.4+reloaded3-8+deb10u1
-	[stretch] - gosa <no-dsa> (Minor issue)
+	[stretch] - gosa 2.7.4+reloaded2-13+deb9u2
 CVE-2019-11186
 	RESERVED
 CVE-2019-11185 (The WP Live Chat Support Pro plugin through 8.0.26 for WordPress conta ...)
@@ -70553,7 +70550,7 @@ CVE-2019-1010006 (Evince 3.26.0 is affected by buffer overflow. The impact is: D
 	{DSA-4624-1 DLA-1882-1 DLA-1881-1}
 	- atril 1.22.2-1
 	[buster] - atril 1.20.3-1+deb10u1
-	[stretch] - atril <no-dsa> (Will be fixed via spu)
+	[stretch] - atril 1.16.1-2+deb9u2
 	- evince 3.27.92-1
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=788980
 	NOTE: https://gitlab.gnome.org/GNOME/evince/commit/e6ed0d4cdb6326e329c8f61f9cc19ff9331cb0ce (3.27.91)
@@ -71365,7 +71362,7 @@ CVE-2019-9658 (Checkstyle before 8.18 loads external DTDs by default. ...)
 	{DLA-1768-1}
 	- checkstyle 8.26-1 (low; bug #924598)
 	[buster] - checkstyle 8.15-1+deb10u1
-	[stretch] - checkstyle <no-dsa> (Minor issue)
+	[stretch] - checkstyle 6.15-1+deb9u1
 	NOTE: https://github.com/checkstyle/checkstyle/issues/6474
 	NOTE: https://github.com/checkstyle/checkstyle/issues/6478
 	NOTE: https://github.com/checkstyle/checkstyle/pull/6476
@@ -73768,7 +73765,7 @@ CVE-2019-8842 [he `ippReadIO` function may under-read an extension field]
 	{DLA-2237-1}
 	- cups 2.3.1-12
 	[buster] - cups 2.2.10-6+deb10u3
-	[stretch] - cups <no-dsa> (Minor issue)
+	[stretch] - cups 2.2.1-8+deb9u6
 	NOTE: https://github.com/apple/cups/commit/82e3ee0e3230287b76a76fb8f16b92ca6e50b444 (cups/ipp.c: ippReadIO)
 CVE-2019-8841
 	RESERVED
@@ -78951,13 +78948,13 @@ CVE-2019-6800 (In TitanHQ SpamTitan through 7.03, a vulnerability exists in the
 CVE-2019-6799 (An issue was discovered in phpMyAdmin before 4.8.5. When the AllowArbi ...)
 	{DLA-1692-1}
 	- phpmyadmin 4:4.9.1+dfsg1-2 (bug #920823)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2019-1/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/aeac90623e525057a7672ab3d98154b5c57c15ec
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/c5e01f84ad48c5c626001cb92d7a95500920a900
 CVE-2019-6798 (An issue was discovered in phpMyAdmin before 4.8.5. A vulnerability wa ...)
 	- phpmyadmin 4:4.9.1+dfsg1-2 (bug #920822)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	[jessie] - phpmyadmin <not-affected> (Vulnerable code introduced later >= 4.5.0)
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2019-2/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/469934cf7d3bd19a839eb78670590f7511399435
@@ -86156,7 +86153,7 @@ CVE-2019-3830 (A vulnerability was found in ceilometer before version 12.0.0.0rc
 CVE-2019-3829 (A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7.  ...)
 	[experimental] - gnutls28 3.6.7-1
 	- gnutls28 3.6.7-2
-	[stretch] - gnutls28 <no-dsa> (Minor issue, can be fixed via point release)
+	[stretch] - gnutls28 3.5.8-5+deb9u5
 	[jessie] - gnutls28 <not-affected> (vulnerable code was introduced later)
 	NOTE: https://bugzilla.redhat.com/show_bug.cgi?id=1677048
 	NOTE: https://gitlab.com/gnutls/gnutls/issues/694
@@ -86529,7 +86526,7 @@ CVE-2019-3689 (The nfs-utils package in SUSE Linux Enterprise Server 12 before a
 	{DLA-1965-1}
 	- nfs-utils 1:1.3.4-3 (bug #940848)
 	[buster] - nfs-utils <no-dsa> (Minor issue)
-	[stretch] - nfs-utils <no-dsa> (Minor issue)
+	[stretch] - nfs-utils 1:1.3.4-2.1+deb9u1
 	NOTE: https://git.linux-nfs.org/?p=steved/nfs-utils.git;a=commitdiff;h=fee2cc29e888f2ced6a76990923aef19d326dc0e
 CVE-2019-3688 (The /usr/sbin/pinger binary packaged with squid in SUSE Linux Enterpri ...)
 	- squid <not-affected> (/usr/lib/squid/pinger permissions are root:root)
@@ -91453,7 +91450,7 @@ CVE-2018-20031 (A Denial of Service vulnerability related to preemptive item del
 CVE-2018-20030 (An error when processing the EXIF_IFD_INTEROPERABILITY and EXIF_IFD_EX ...)
 	{DLA-2222-1 DLA-2214-1}
 	- libexif 0.6.21-5.1 (bug #918730)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u2
 	NOTE: https://secuniaresearch.flexerasoftware.com/secunia_research/2018-28/
 	NOTE: https://github.com/libexif/libexif/commit/6aa11df549114ebda520dde4cdaea2f9357b2c89
 CVE-2018-20029 (The nxfs.sys driver in the DokanFS library 0.6.0 in NoMachine before 6 ...)
@@ -92365,7 +92362,7 @@ CVE-2018-20024 (LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 co
 	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
 	- ssvnc 1.0.29-5 (bug #945827)
 	[buster] - ssvnc <no-dsa> (Minor issue)
-	[stretch] - ssvnc <no-dsa> (Minor issue)
+	[stretch] - ssvnc 1.0.29-3+deb9u1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/LibVNC/libvncserver/issues/254
 	NOTE: https://github.com/LibVNC/libvncserver/commit/4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7
@@ -92386,7 +92383,7 @@ CVE-2018-20022 (LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains
 	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
 	- ssvnc 1.0.29-5 (bug #945827)
 	[buster] - ssvnc <no-dsa> (Minor issue)
-	[stretch] - ssvnc <no-dsa> (Minor issue)
+	[stretch] - ssvnc 1.0.29-3+deb9u1
 	- tightvnc 1:1.3.9-9.1
 	[buster] - tightvnc 1:1.3.9-9deb10u1
 	[stretch] - tightvnc 1:1.3.9-9+deb9u1
@@ -92401,7 +92398,7 @@ CVE-2018-20021 (LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c co
 	[stretch] - italc 1:3.0.3+dfsg1-1+deb9u1
 	- ssvnc 1.0.29-5 (bug #945827)
 	[buster] - ssvnc <no-dsa> (Minor issue)
-	[stretch] - ssvnc <no-dsa> (Minor issue)
+	[stretch] - ssvnc 1.0.29-3+deb9u1
 	- tightvnc 1:1.3.9-9.1
 	[buster] - tightvnc 1:1.3.9-9deb10u1
 	[stretch] - tightvnc 1:1.3.9-9+deb9u1
@@ -92416,7 +92413,7 @@ CVE-2018-20020 (LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d co
 	[stretch] - italc <not-affected> (Incomplete fix for CVE-2018-20019 not applied)
 	- ssvnc 1.0.29-5 (bug #945827)
 	[buster] - ssvnc <no-dsa> (Minor issue)
-	[stretch] - ssvnc <no-dsa> (Minor issue)
+	[stretch] - ssvnc 1.0.29-3+deb9u1
 	- veyon 4.1.4+repack1-1
 	NOTE: https://github.com/LibVNC/libvncserver/issues/250
 	NOTE: https://github.com/LibVNC/libvncserver/commit/09f2f3fb6a5a163e453e5c2979054670c39694bc
@@ -92601,7 +92598,7 @@ CVE-2018-19971 (JFrog Artifactory Pro 6.5.9 has Incorrect Access Control. ...)
 CVE-2018-19970 (In phpMyAdmin before 4.8.4, an XSS vulnerability was found in the navi ...)
 	{DLA-1658-1}
 	- phpmyadmin 4:4.9.1+dfsg1-2
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2018-8/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/b293ff5f234ef493336ed8638f623a12164d359e
 CVE-2018-19969 (phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected by a s ...)
@@ -92614,7 +92611,7 @@ CVE-2018-19969 (phpMyAdmin 4.7.x and 4.8.x versions prior to 4.8.4 are affected
 CVE-2018-19968 (An attacker can exploit phpMyAdmin before 4.8.4 to leak the contents o ...)
 	{DLA-1658-1}
 	- phpmyadmin 4:4.9.1+dfsg1-2
-	[stretch] - phpmyadmin <no-dsa> (Minor issue; can be fixed via point release)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	NOTE: https://www.phpmyadmin.net/security/PMASA-2018-6/
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/6a1ba61e29002f0305a9322a8af4eaaeb11c0732
 CVE-2018-19959
@@ -106407,7 +106404,7 @@ CVE-2018-16336 (Exiv2::Internal::PngChunk::parseTXTChunk in Exiv2 v0.26 allows r
 	{DLA-1551-1}
 	- exiv2 0.27.2-6 (bug #916081)
 	[buster] - exiv2 <ignored> (Minor issue)
-	[stretch] - exiv2 <ignored> (Minor issue)
+	[stretch] - exiv2 0.25-3.1+deb9u2
 	NOTE: https://github.com/Exiv2/exiv2/issues/400
 	NOTE: https://github.com/Exiv2/exiv2/commit/35b3e596edacd2437c2c5d3dd2b5c9502626163d
 CVE-2018-16335 (newoffsets handling in ChopUpSingleUncompressedStrip in tif_dirread.c  ...)
@@ -124530,6 +124527,7 @@ CVE-2018-9518 (In nfc_llcp_build_sdreq_tlv of llcp_commands.c, there is a possib
 	NOTE: Fixed by: https://git.kernel.org/linus/fe9c842695e26d8116b61b80bfb905356f07834b (4.16-rc3)
 CVE-2018-9517 (In pppol2tp_connect, there is possible memory corruption due to a use  ...)
 	- linux 4.14.2-1
+	[stretch] - linux 4.9.228-1
 	[jessie] - linux 3.16.51-1
 	NOTE: https://git.kernel.org/linus/f026bc29a8e093edfbb2a77700454b285c97e8ad
 	NOTE: https://source.android.com/security/bulletin/pixel/2018-09-01
@@ -130932,7 +130930,7 @@ CVE-2018-7261 (There are multiple Persistent XSS vulnerabilities in Radiant CMS
 	NOT-FOR-US: Radiant CMS
 CVE-2018-7260 (Cross-site scripting (XSS) vulnerability in db_central_columns.php in  ...)
 	- phpmyadmin 4:4.9.1+dfsg1-2 (bug #893539)
-	[stretch] - phpmyadmin <no-dsa> (Minor issue)
+	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
 	[jessie] - phpmyadmin <not-affected> (Vulnerable code not present)
 	[wheezy] - phpmyadmin <not-affected> (Vulnerable code not present)
 	NOTE: https://github.com/phpmyadmin/phpmyadmin/commit/d2886a3e8745e8845633ae8a0054b5ee4d8babd5
@@ -141137,7 +141135,7 @@ CVE-2018-3775 (Improper Authentication in Nextcloud Server prior to version 12.0
 	- nextcloud <itp> (bug #835086)
 CVE-2018-3774 (Incorrect parsing in url-parse <1.4.3 returns wrong hostname which  ...)
 	- node-url-parse 1.2.0-2 (bug #906058)
-	[stretch] - node-url-parse <ignored> (Nodejs in stretch not covered by security support)
+	[stretch] - node-url-parse 1.0.5-2+deb9u1
 	NOTE: https://hackerone.com/reports/384029
 	NOTE: https://github.com/unshiftio/url-parse/commit/53b1794e54d0711ceb52505e0f74145270570d5a
 	NOTE: https://github.com/unshiftio/url-parse/commit/d7b582ec1243e8024e60ac0b62d2569c939ef5de
@@ -151708,7 +151706,7 @@ CVE-2017-1000207 (A vulnerability in Swagger-Parser's version <= 1.0.30 and S
 CVE-2017-1000159 (Command injection in evince via filename when printing to PDF. This af ...)
 	{DSA-4624-1 DLA-1882-1 DLA-1881-1 DLA-1204-1}
 	- atril 1.20.0-1 (low)
-	[stretch] - atril <no-dsa> (Minor issue; will be fixed via spu)
+	[stretch] - atril 1.16.1-2+deb9u2
 	- evince 3.25.92-1 (low)
 	[stretch] - evince <no-dsa> (Minor issue)
 	NOTE: https://bugzilla.gnome.org/show_bug.cgi?id=784947
@@ -168665,7 +168663,7 @@ CVE-2017-11748 (VIT Spider Player 2.5.3 has an untrusted search path, allowing D
 CVE-2017-11747 (main.c in Tinyproxy 1.8.4 and earlier creates a /run/tinyproxy/tinypro ...)
 	{DLA-2163-1}
 	- tinyproxy 1.10.0-1 (bug #870307)
-	[stretch] - tinyproxy <no-dsa> (Minor issue)
+	[stretch] - tinyproxy 1.8.4-3~deb9u2
 	[wheezy] - tinyproxy <no-dsa> (Minor issue)
 	NOTE: https://github.com/tinyproxy/tinyproxy/issues/106
 CVE-2017-11746 (Tenshi 0.15 creates a tenshi.pid file after dropping privileges to a n ...)
@@ -181787,7 +181785,7 @@ CVE-2017-7545 (It was discovered that the XmlUtils class in jbpmmigration 6.5 pe
 CVE-2017-7544 (libexif through 0.6.21 is vulnerable to out-of-bounds heap read vulner ...)
 	{DLA-2214-1}
 	- libexif 0.6.21-2.1 (bug #876466)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u2
 	[wheezy] - libexif <no-dsa> (Minor issue)
 	NOTE: https://sourceforge.net/p/libexif/bugs/130/
 CVE-2017-7543 (A race-condition flaw was discovered in openstack-neutron before 7.2.0 ...)
@@ -213311,7 +213309,7 @@ CVE-2016-6329 (OpenVPN, when using a 64-bit block cipher, makes it easier for re
 CVE-2016-6328 (A vulnerability was found in libexif. An integer overflow when parsing ...)
 	{DLA-2214-1}
 	- libexif 0.6.21-2.1 (bug #873022)
-	[stretch] - libexif <no-dsa> (Minor issue)
+	[stretch] - libexif 0.6.21-2+deb9u2
 	[wheezy] - libexif <no-dsa> (Minor issue)
 	NOTE: http://libexif.cvs.sourceforge.net/viewvc/libexif/libexif/libexif/pentax/mnote-pentax-entry.c?r1=1.26&r2=1.27
 CVE-2016-6327 (drivers/infiniband/ulp/srpt/ib_srpt.c in the Linux kernel before 4.5.1 ...)


=====================================
data/next-oldstable-point-update.txt
=====================================
@@ -1,205 +0,0 @@
-CVE-2018-16336
-	[stretch] - exiv2 0.25-3.1+deb9u2
-CVE-2018-3774
-	[stretch] - node-url-parse 1.0.5-2+deb9u1
-CVE-2019-11187
-	[stretch] - gosa 2.7.4+reloaded2-13+deb9u2
-CVE-2019-14466
-	[stretch] - gosa 2.7.4+reloaded2-13+deb9u3
-CVE-2018-7260
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2018-19968
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2018-19970
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-6799
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-6798
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-11768
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-12616
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2020-5504
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2020-10802
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2020-10803
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2020-10804
-	[stretch] - phpmyadmin 4:4.6.6-4+deb9u1
-CVE-2019-20372
-	[stretch] - nginx 1.10.3-1+deb9u4
-CVE-2016-10894
-	[stretch] - xtrlock 2.8+deb9u1
-CVE-2019-16275
-	[stretch] - wpa 2:2.4-1+deb9u6
-CVE-2020-3123
-	[stretch] - clamav 0.102.2+dfsg-0~deb9u1
-CVE-2020-3327
-	[stretch] - clamav 0.102.3+dfsg-0~deb9u1
-CVE-2020-3341
-	[stretch] - clamav 0.102.3+dfsg-0~deb9u1
-CVE-2020-8130
-	[stretch] - rake 10.5.0-2+deb9u1
-CVE-2020-5267
-	[stretch] - rails 2:4.2.7.1-1+deb9u2
-CVE-2019-9658
-	[stretch] - checkstyle 6.15-1+deb9u1
-CVE-2019-15522
-	[stretch] - csync2 2.0-8-g175a01c-4+deb9u1
-CVE-2017-11747
-	[stretch] - tinyproxy 1.8.4-3~deb9u2
-CVE-2019-15690
-	[stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u4
-CVE-2019-20788
-	[stretch] - libvncserver 0.9.11+dfsg-1.3~deb9u4
-CVE-2020-8518
-	[stretch] - php-horde-data 2.1.4-3+deb9u1
-CVE-2020-8866
-	[stretch] - php-horde-form 2.0.15-1+deb9u2
-CVE-2020-8865
-	[stretch] - php-horde-trean 1.1.7-1+deb9u1
-CVE-2020-3898
-	[stretch] - cups 2.2.1-8+deb9u6
-CVE-2019-8842
-	[stretch] - cups 2.2.1-8+deb9u6
-CVE-2020-XXXX
-	[stretch] - fex 20160919-2~deb9u1
-CVE-2016-6328
-	[stretch] - libexif 0.6.21-2+deb9u2
-CVE-2017-7544
-	[stretch] - libexif 0.6.21-2+deb9u2
-CVE-2018-20030
-	[stretch] - libexif 0.6.21-2+deb9u2
-CVE-2020-12767
-	[stretch] - libexif 0.6.21-2+deb9u2
-CVE-2020-0093
-	[stretch] - libexif 0.6.21-2+deb9u2
-CVE-2020-8034
-	[stretch] - php-horde-gollem 3.0.10-1+deb9u1
-CVE-2018-20020
-	[stretch] - ssvnc 1.0.29-3+deb9u1
-CVE-2018-20021
-	[stretch] - ssvnc 1.0.29-3+deb9u1
-CVE-2018-20022
-	[stretch] - ssvnc 1.0.29-3+deb9u1
-CVE-2018-20024
-	[stretch] - ssvnc 1.0.29-3+deb9u1
-CVE-2020-8035
-	[stretch] - php-horde 5.2.13+debian0-1+deb9u2
-CVE-2020-13112
-	[stretch] - libexif 0.6.21-2+deb9u3
-CVE-2020-13113
-	[stretch] - libexif 0.6.21-2+deb9u3
-CVE-2020-13114
-	[stretch] - libexif 0.6.21-2+deb9u3
-CVE-2020-12872
-	[stretch] - erlang 1:19.2.1+dfsg-2+deb9u3
-CVE-2020-10543
-	[stretch] - perl 5.24.1-3+deb9u7
-CVE-2020-10878
-	[stretch] - perl 5.24.1-3+deb9u7
-CVE-2020-12723
-	[stretch] - perl 5.24.1-3+deb9u7
-CVE-2020-10663
-	[stretch] - ruby-json 2.0.1+dfsg-3+deb9u1
-	[stretch] - ruby2.3 2.3.3-1+deb9u8
-CVE-2020-12049
-	[stretch] - dbus 1.10.32-0+deb9u1
-CVE-2019-3689
-	[stretch] - nfs-utils 1:1.3.4-2.1+deb9u1
-CVE-2019-3829
-	[stretch] - gnutls28 3.5.8-5+deb9u5
-CVE-2020-0182
-	[stretch] - libexif 0.6.21-2+deb9u4
-CVE-2020-0198
-	[stretch] - libexif 0.6.21-2+deb9u4
-CVE-2020-5963
-	[stretch] - nvidia-graphics-drivers 390.138-1
-CVE-2020-5967
-	[stretch] - nvidia-graphics-drivers 390.138-1
-CVE-2020-2752
-	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
-CVE-2020-2812
-	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
-CVE-2020-2814
-	[stretch] - mariadb-10.1 10.1.45-0+deb9u1
-CVE-2018-9517
-	[stretch] - linux 4.9.228-1
-CVE-2019-20810
-	[stretch] - linux 4.9.228-1
-CVE-2020-10690
-	[stretch] - linux 4.9.228-1
-CVE-2020-10766
-	[stretch] - linux 4.9.228-1
-CVE-2020-10767
-	[stretch] - linux 4.9.228-1
-CVE-2020-10768
-	[stretch] - linux 4.9.228-1
-CVE-2020-12769
-	[stretch] - linux 4.9.228-1
-CVE-2020-12826
-	[stretch] - linux 4.9.228-1
-CVE-2020-13974
-	[stretch] - linux 4.9.228-1
-CVE-2020-1749
-	[stretch] - linux 4.9.228-1
-CVE-2020-0009
-	[stretch] - linux 4.9.228-1
-CVE-2020-15562
-	[stretch] - roundcube 1.2.3+dfsg.1-4+deb9u6
-CVE-2020-7040
-	[stretch] - storebackup 3.2.1-2~deb9u1
-CVE-2020-9548
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-9547
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-9546
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-8840
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-14195
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-14062
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-14061
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-14060
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11620
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11619
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11113
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11112
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11111
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-10969
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-10968
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-10673
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-10672
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2019-20330
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2019-17531
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2019-17267
-	[stretch] - jackson-databind 2.8.6-1+deb9u7
-CVE-2020-11736
-	[stretch] - file-roller 3.22.3-1+deb9u2
-CVE-2017-1000159
-	[stretch] - atril 1.16.1-2+deb9u2
-CVE-2019-1010006
-	[stretch] - atril 1.16.1-2+deb9u2
-CVE-2019-11459
-	[stretch] - atril 1.16.1-2+deb9u2
-CVE-2019-17566
-	[stretch] - batik 1.8-4+deb9u2
-CVE-2020-13645
-	[stretch] - glib-networking 2.50.0-1+deb9u1



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1f0c4494dad1f422efa99a9239bfb795e7fe9a2c...527e1c28557e88a3a844c2e302bd50941d2a91e0

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/compare/1f0c4494dad1f422efa99a9239bfb795e7fe9a2c...527e1c28557e88a3a844c2e302bd50941d2a91e0
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20200718/30ae2417/attachment-0001.html>


More information about the debian-security-tracker-commits mailing list